Adobe and Microsoft each released updates today to tackle critical security weaknesses in their software. Microsoft’s December patch batch is relatively light, addressing more than three dozen vulnerabilities in Windows and related applications. Adobe has issued security fixes for its Acrobat and PDF Reader products, and has a patch for yet another zero-day flaw in Flash Player that is already being exploited in the wild.
At least nine of the bugs in the Microsoft patches address flaws the company deems “critical,” meaning they can be exploited by malware or ne’er-do-wells to install malicious software with little or no help from…
It will take a dramatic reimagining of security to dedicate focus to the areas where company data actually resides. It starts with tearing down the firewall.
The Long Read: We increasingly let computers fly planes and carry out security checks. Driverless cars are next. But is our reliance on automation dangerously diminishing our skills?
The "Ransomware Response Guide" can help your organization prepare for preventing this common threat or validate your existing security policies.
Google's Unattended Project Reminder helps identify and eliminate unattended cloud projects that could become a security risk.
Organizations are itching to start internet of things initiatives, but their efforts are hampered by shortages of already-scarce security pros and workers with newer analytics skills.
AppSec Talk is a video series in which industry professionals answer some of application security's biggest questions. (ISC)²’s Application Security Advisory...
Learn about all the cool things Tyco Integrated Security does to help protect businesses just like yours, along with securing many of the public and governme...
And rising car thefts suggest the criminals are taking advantage
Apple released a critical software patch to fix a security vulnerability that researchers said could allow hackers to directly infect iPhones and other Apple devices without any user action.
Posted by Eran Feigenbaum, Director of Security Google for Work As an IT manager, we realize you spend a lot of time managing devices, a...
As dozens of cloud-based IT management software solutions pop-up promising various perks and discounts, one would probably question the validity of
Winn Schwartau from The Security Awareness Company explains how many companies create security awareness programs that fail, before showing how you can make ...
The security of the Internet of Things is fundamentally broken. Developers and manufacturers understandably are eager to get their new hi-tech products to market and unfortunately often overlook security, instead operating under the misapprehension that security-by-obscurity in their proprietary systems will do. The problem is that security researchers, and those with more malicious intent, can almost always extract binary code from the device memory via JTAG…
InfoSight is an information security and IT company that protects businesses and their customers from cyber threats and fraud. Choosing a cyber security and ...
It used to be so simple. A new employee joined your organisation and you gave them a laptop, which was entirely under your control.
Internet cookies may not be delicious, but they can make your online life easier and more personalized. But should you worry about a security risk?
Is your nonprofit doing enough to secure its most important data? Our friends at Idealware have put together their newest report: What Nonprofits Need to Know About Security: A Practical Guide to Managing Risk.
"Internet of Things" developers must think about how attackers might attempt to exploit a device, and why, and then write code designed to block such
As we’ve seen before, one of the greatest cybersecurity threats facing both consumer- and enterprise-focused organizations is the rise of connected devices - the internet of things (IoT). IoT devices are the bridge we’ve been anticipating between the digital world and physical objects. Whether a warehouse robot or a home security camera, the technology that powers these devices is essentially the same. A powerful blend of…
Legacy hardware is often kept at an organization longer than necessary. This not only poses operational workarounds, but also security risks. Admins can make their data center infrastructure more secure through consistent review and hardware replacement.